Computer Science ›› 2024, Vol. 51 ›› Issue (6A): 230800145-9.doi: 10.11896/jsjkx.230800145
• Information Security • Previous Articles Next Articles
GENG Qian1,2, CHUAI Ziang2, JIN Jian2
CLC Number:
[1]WANG L,WANG X,MA C D.Distributed caching strategy for data exchange program based on ontology and KNN algorithm[J].Computer Science,2016,43(S2):316-319. [2]KARLSSON F,FROSTENSON M,PRENKERT F,et al.Inter-organisational information sharing in the public sector:A longitudinal case study on thereshaping of success factors[J].Government Information Quarterly,2017,34(4):567-577. [3]SUSHA I,RUKANOVA B,ZUIDERWIJK A,et al.Achieving voluntary data sharing in cross sector partnerships:Three partnership models[J].Information and Organization,2023,33(1):100448. [4]ABDELLATIF A A,SAMARA L,MOHAMED A,et al.MEdge-Chain:Leveraging edge computing and blockchain for efficient medical data exchange[J].IEEE Internet of Things Journal,2021,8(21):15762-15775. [5]DONG Z,DAU S H,YUEN C,et al.Delay minimization for relay-based cooperative data exchange with network coding[J].IEEE/ACM Transactions on Networking,2015,23(6):1890-1902. [6]LI T T,REN W,XIANG Y X,et al.FAPS:A fair,autonomous and privacy-preserving scheme for big data exchange based on oblivious transfer,Ether cheque and smart contracts[J].Information Sciences,2021,544:469-484. [7]LING F,CHEN S P.Shared digital credits management mechanism of enterprise alliance based on blockchain[J].Computer Science,2021,48(S2):533-539. [8]WANG T,MA W P,LUO W.Information sharing and secure multi-party computing model based on blockchain[J].Computer Science,2019,46(9):162-168. [9]FENG T,JIAO Y,FANG J L,et al.Medical health data security model based on alliance blockchain[J].Computer Science,2020,47(4):305-311. [10]ZHU P,HU J,ZHANG Y,et al.Enhancing traceability of infectious diseases:A blockchain-based approach[J].Information Processing & Management,2021,58(4):102570. [11]LV Z H,LI X M,WANG W X,et al.Government affairs service platform for smart city[J].Future Generation Computer Systems,2018,81:443-451. [12]PIAO C,SHI Y,YAN J,et al.Privacy-preservinggovernmental data publishing:A fog-computing-based differential privacy approach[J].Future Generation Computer Systems,2019,90:158-174. [13]TONG W,DONG X W,SHEN Y L,et al.A blockchain-driven data exchange model in multi-domain IoT with controllability and parallelity[J].Future Generation Computer Systems,2022,135:85-94. [14]ZHU T,GUO J W,ZHOU H,et al.Consistency and availability in distributed database systems[J].Journal of Software,2018,29(1):131-149. [15]GILBERT S,LYNCH N A.Brewer’s conjecture and the feasibility of consistent,available,partition-tolerant web services[C]//SIGACT News.2002:51-59. [16]VIOTTI P,VUKOLIC M.Consistency in non-transactional distributed storage systems[J].ACM Computing Surveys,2016,49(1):19. [17]ZHAO Y,FAN B.Effect of an agency’s resources on the implementation of open government data[J].Information & Management,2021,58(4):103465-103476. [18]DING J L,ZHOU D X,WANG J,et al.Remote database synchronization mechanism based on SQL capture from connection driver[J].Computer Engineering,2017,43(9):39-42. [19]ZENG J X.Reflection on the development of the scientific and technical information industry based on the national science and technology management platform[J].Journal of the China Society for Scientific and Technical Information,2019,38(3):227-238. [20]ZHANG X G,PAN J H.Research and implementation of log analyze method of MS SQL Server 2000[J].Computer Engineering and Design,2006,19:3557-3560. [21]GEORGIOU M A,PAPHITIS A,SIRIVIANOS M,et al.Towards auto-scaling existing transactional databases with strong consistency[C]//IEEE 35th International Conference on Data Engineering Workshops.Macao,China,2019:107-112. [22]TIAN J F,BAI W Q,JIA H Y.PGCE:A distributed storagecausal consistency model based on partial geo-replication and cloud-edge collaboration architecture[J].Computer Networks,2022,212:109065. [23]PIAO C,HAO Y,YAN J,et al.Privacy preserving in block-chain-based government data sharing:A Service-On-Chain(SOC) approach[J].Information Processing & Management,2021,58(5):102651-102663. [24]ALI O,SHRESTHA A,CHATFIELD A,et al.Assessing information security risks in the cloud:A case study of Australian local government authorities[J].Government Information Quarterly,2020,37(1):101419-101439. [25]ZHENG L J,LIU J Q,TAO Y N,et al.Medical information attribute encryption access control scheme based on blockchain[J].Journal of Cyber Security,2023,8(1):93-107. [26]SANKA A I,CHEUNG R C C.A systematic review of blockchain scalability:Issues,solutions,analysis and future research[J].Journal of Network and Computer Applications,2021,195:103232-103256. [27]BERDIK D,OTOUM S,SCHMIDT N,et al.A survey on blockchain for information systems management and security[J].Information Processing & Management,2021,58(1):102397-102425. [28]CAMPANILE L,IACONO M,MARULLI F,et al.Designing a GDPR compliant blockchain-based IoV distributed information tracking system[J].Information Processing & Management,2021,58(3):102511-102534. [29]ENGIN Z,TRELEAVEN P.Algorithmic government:Automating public services and supporting civil servants in using data science technologies[J].The Computer Journal,2019,52(3):448-460. [30]WANG L P,GUAN Z,LI Q S,et al.Survey on blockchain-based security services[J].Journal of Software,2023,34(1):1-32. [31]GIL-GARCIA J R,GULER A,PARDO T A,et al.Characterizing the importance of clarity of roles and responsibilities in government inter-organizationalcollaboration and information sharing initiatives[J].Government Information Quarterly,2019,36(4):101393-101400. [32]WANG H L,TIAN Y L,YIN X.Blockchain-based big dataright confirmation scheme[J].Computer Science,2018,45(2):15-19,24. [33]ZHU X R,WU H H,HU W.FactChain:A blockchain-based crowdsourcing knowledge fusion system[J].Journal of Software,2022,33(10):3546-3564. [34]BURCKHARDT S.Consistency in distributed systems[M].Software Engineering.Springer,2013:84-120. [35]BERMBACH D,KUHLENKAMP J.Consistency in distributed storage systems-An overview of models,metrics and measurement approaches[C]//Networked Systems.2013:7853. [36]LIN Y,KEMME B,PATINO M,et al.Middleware based data replication providing snapshot isolation[C]//The ACM SIGMOD.2005:419-430. [37]NAIK N.Comprehending concurrency and consistency in distributed systems[C]//IEEE International Symposium on Systems Engineering.Vienna,Austria,2021:1-6. [38]BURCKHARDT S,GOTSMAN A,YANG H,et al.Replicated data types:Specification,verification,optimality[C]//ACMSIGPLAN-SIGACT Symposium on Principles of Programming Languages,2014:271-284. [39]KRASKA T,HENTSCHEL M,ALONSO M,et al.Consistency rationing in the cloud:pay only when it matters[C]//VLDB Endowment.2009:253-264. [40]LI C,PORTO D,CLEMENT A,et al.Making geo-replicatedsystems fast as possible,consistent when necessary[C]//10th USENIX conference on Operating Systems Design and Implementation,USENIX Association,USA,2012:265-278. [41]CHIHOUB H E,IBRAHIM S,ANTONIU G,et al.Harmony:Towards automated self-adaptive consistency in cloud storage[C]//International Conference on Cluster Computing.Beijing,China,2012:293-301. [42]TERRY D B,PRABHAKARAN V,KOTLA R,et al.Consistency-based service level agreements for cloud storage[C]//Twenty-Fourth ACM Symposium on Operating Systems Principles.2013:309-324. [43]LI P,PAN L,YANG X,et al.Stabilizer:Geo-replication with user-defined consistency[C]//IEEE 42nd International Conference on Distributed Computing Systems.Bologna,Italy,2022:359-369. [44]KHELAIFA A,BENHARZALLAH S,KAHLOUL L,et al.A comparative analysis of adaptive consistency approaches in cloud storage[J].Journal of Parallel and Distributed Computing,2019,129:36-49. [45]NORVAG K.The vagabond approach to logging and recovery in transaction-time temporal object database systems[J].IEEE Transactions on Knowledge and Data Engineering,2004,16(4):504-518. [46]GAO S,XU J,HÄRDER T,et al.PCMLogging:Optimizingtransaction logging and recovery performance with PCM[J].IEEE Transactions on Knowledge and Data Engineering,2015,27(12):3332-3346. [47]GOU Z A,ZHANG X,WU D N,et al.Log analysis and workload characteristic extraction in distributed storage system[J].Journal of Computer Applications,2020,40(9):2586-2593. [48]HUANG R H,WANG J M,SONG S X,et al.Efficiently clean-ing structured event logs:A graph repair approach[J].ACM Transaction on Database Systems,2023,48(1):1-44. [49]MUZAMMAL M,QU Q,NASRULIN B.Renovating block-chain with distributed databases:An open source system[J].Future Generation Computer Systems,2019,90:105-117. [50]SANKA A I,IRFAN M,HUANG I,et al.A survey of breakthrough in blockchain technology:adoptions,applications,challenges and future research[J].Computer Communications,2021,169:179-201. [51]LU G H,XIE L H,LI X Y.Comparative research of blockchain consensus algorithm[J].Computer Science,2020,47(S1):332-339. [52]MIYACHI K,MACKEY T K.hOCBS:A privacy-preservingblockchain framework for healthcare data leveraging an on-chain and off-chain system design[J].Information Processing & Mana-gement,2021,58(3):102535-102558. |
[1] | KANG Zhong, WANG Maoning, MA Xiaowen, DUAN Meijiao. New Design of Redactable Consortium Blockchain Scheme Based on Multi-user Chameleon Hash [J]. Computer Science, 2024, 51(6A): 230600004-6. |
[2] | XIE Zhuo, ZHANG Zhi-hong, LI Lei, FENG Ying-jie, CHEN Jing. Improvement of PBFT Algorithm Based on Consortium Blockchain [J]. Computer Science, 2022, 49(11): 360-367. |
[3] | WANG Ri-hong, ZHOU Hang, XU Quan-qing, ZHANG Li-feng. Non-byzantine Fault Tolerance Consensus Algorithm for Consortium Blockchain [J]. Computer Science, 2021, 48(9): 317-323. |
[4] | MAO Han-yu, NIE Tie-zheng, SHEN De-rong, YU Ge, XU Shi-cheng, HE Guang-yu. Survey on Key Techniques and Development of Blockchain as a Service Platform [J]. Computer Science, 2021, 48(11): 4-11. |
[5] | E Hai-hong, HAN Peng-hao, SONG Mei-na. Conversion Method from Relational Database to Graph Database [J]. Computer Science, 2021, 48(10): 140-144. |
[6] | LU Zheng-fu, PU Yan-hong, NI Sheng-bin, XU Chen-ming, YANG Chun-yao. Design and Simulation of Fair Data Exchange Protocol with Bounded Rationality [J]. Computer Science, 2018, 45(11): 115-123. |
[7] | HAN Lin, ZHANG Chun-hai and XU Jian-liang. Data Exchange Based on QR Code in Physically Isolated Internal and External Network Environment [J]. Computer Science, 2016, 43(Z11): 520-522. |
[8] | WANG Li, WANG Xin and MA Chao-dong. Distributed Caching Strategy for Data Exchange Program Based on Ontology and KNN Algorithm [J]. Computer Science, 2016, 43(Z11): 316-319. |
[9] | REN Ke and YANG Xia. Sorting Based XML Data Exchange Algorithm [J]. Computer Science, 2014, 41(5): 223-226. |
[10] | ZHANG De-gang,LUO Xue-li,SHENG Jun,XU Shu-zhen and TIAN Lei. Research on Data Integration Based on ERP in Electric Power Enterprise [J]. Computer Science, 2013, 40(Z6): 160-162. |
[11] | SUN Qing-he and LIU Dao-qun. Discussion on Application of Technology of Network Isolation in Mobile Office Based on 3G Network [J]. Computer Science, 2013, 40(Z6): 381-383. |
[12] | SHI Mao,KANG Bao-sheng,YE Zheng-lin,BAI Hong-wu. Research on Degree Reduction of Parameters Curves and Surfaces [J]. Computer Science, 2010, 37(10): 233-238. |
[13] | HUANG Wen ,WEN Chun-sheng ,OU Hong-xin (Network Center, Hunan University of Science and Engineering, Yongzhou Hunan 425006,China). [J]. Computer Science, 2008, 35(6): 128-130. |
[14] | WANG Bo GUO Bo (College of Information System and Management, National University of Defense Technology, Changsha 410073). [J]. Computer Science, 2008, 35(1): 117-120. |
[15] | . [J]. Computer Science, 2007, 34(11): 98-102. |
|